This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 0015edd6f661 Merge tag 'clk-for-linus' of git://git.kernel.org/pub/scm/ [...] new 3cd60866d460 module: remove redundant module_sysfs_initialized variable new 89a6b5917650 module: Remove unused macros module_addr_min/max new 96a1a2412acb kernel/params.c: defer most of param_sysfs_init() to late_ [...] new 45af1d7aae7d module: Fix NULL vs IS_ERR checking for module_get_next_page new fcdf7197cf23 scripts/kallsyms: rename build_initial_tok_table() new 60443c88f3a8 kallsyms: Improve the performance of kallsyms_lookup_name() new 010a0aad39fc kallsyms: Correctly sequence symbols when CONFIG_LTO_CLANG=y new 19bd8981dc2e kallsyms: Reduce the memory occupied by kallsyms_seqs_of_names[] new 4dc533e0f2c0 kallsyms: Add helper kallsyms_on_each_match_symbol() new 9cb37357dfce livepatch: Use kallsyms_on_each_match_symbol() to improve [...] new 30f3bb09778d kallsyms: Add self-test facility new c86a514f5fad kallsyms: Remove unneeded semicolon new 169a58ad824d module/decompress: Support zstd in-kernel decompression new 4f1354d5c6a3 livepatch: Call klp_match_callback() in klp_find_callback( [...] new 3ba2c3ff98ea Merge tag 'modules-6.2-rc1' of git://git.kernel.org/pub/sc [...] new 0dff89c4488f sched: Move numa_balancing sysctls to its own file new 8fa37a68359d Merge tag 'sysctl-6.2-rc1' of git://git.kernel.org/pub/scm [...] new 5adedd42245a KEYS: encrypted: fix key instantiation with user-provided data new 0be56a116220 efi: Add iMac Pro 2017 to uefi skip cert quirk new 11220db412ed ima: Fix a potential NULL pointer access in ima_restore_me [...] new d57378d3aa4d ima: Simplify ima_lsm_copy_rule new c7423dbdbc9e ima: Handle -ESTALE returned by ima_filter_rule_match() new 8c1d6a050a0f ima: Fix memory leak in __ima_inode_hash() new 39419ef7af09 integrity: Fix memory leakage in keyring allocation error path new 25369175ce84 ima: Fix misuse of dereference of pointer in template_desc [...] new b6018af440a0 ima: Fix hash dependency to correct algorithm new 717e6eb49bdd Merge tag 'integrity-v6.2' of git://git.kernel.org/pub/scm [...] new 085e2ff9aeb0 efi: libstub: Drop randomization of runtime memory map new 48b9491cfe08 efi: libstub: Drop handling of EFI properties table new 0d60ffeec53c efi: libstub: Deduplicate ftrace command line argument filtering new aaeb3fc614d6 arm64: efi: Move dcache cleaning of loaded image out of ef [...] new 7a35cb0a6ec0 arm64: efi: Avoid dcache_clean_poc() altogether in efi_ent [...] new 4ef806096bdb arm64: efi: Move efi-entry.S into the libstub source directory new f9a3c8488762 MAINTAINERS: adjust entry after arm64 efi-entry.S file movement new fa882a1389b2 efi: libstub: Use local strncmp() implementation unconditionally new 52dce39cd278 efi: libstub: Clone memcmp() into the stub new 2e6fa86f2d48 efi: libstub: Enable efi_printk() in zboot decompressor new 06064800d92a efi: loongarch: Drop exports of unused string routines new 732ea9db9d8a efi: libstub: Move screen_info handling to common code new da8dd0c75b3f efi: libstub: Provide local implementations of strrchr() a [...] new 42c8ea3dca09 efi: libstub: Factor out EFI stub entrypoint into separate file new 1f1ba325a23d efi: libstub: Add image code and data size to the zimage metadata new 895bc3a135ff efi: libstub: Factor out min alignment and preferred kerne [...] new f1a116c055e3 efi/riscv: libstub: Split off kernel image relocation for [...] new d9ffe524a538 efi/arm64: libstub: Split off kernel image relocation for [...] new 0efb61c89fa0 efi/loongarch: Don't jump to kernel entry via the old image new d729b554e179 efi/loongarch: libstub: Split off kernel image relocation [...] new c51e97e7f129 efi: libstub: Merge zboot decompressor with the ordinary stub new 977122898ea5 Merge tag 'efi-zboot-direct-for-v6.2' into efi/next new 9cf42bca30e9 efi: libstub: use EFI_LOADER_CODE region when moving the k [...] new 70912985545a efi: libstub: Implement devicepath support for initrd comm [...] new a61962d8e7d3 efi: libstub: Permit mixed mode return types other than ef [...] new f8a31244d732 efi: libstub: Add mixed mode support to command line initr [...] new 75e1a2460d79 efi: libstub: Undeprecate the command line initrd loader new 4059ba656ce5 efi: memmap: Move EFI fake memmap support into x86 arch tree new fdc6d38d64a2 efi: memmap: Move manipulation routines into x86 arch tree new d85e3e349407 efi: xen: Set EFI_PARAVIRT for Xen dom0 boot on all architectures new 36d5786a1c55 efi: pstore: Add module parameter for setting the record size new 8dfac4d8ad27 efi: runtime-maps: Clarify purpose and enable by default f [...] new 1fff234de2b6 efi: x86: Move EFI runtime map sysfs code to arch/x86 new d981a88c1669 efi: libstub: fix efi_load_initrd_dev_path() kernel-doc comment new abdbf1a25daf efi/cper, cxl: Decode CXL Protocol Error Section new 2fb6999dd06f efi/cper, cxl: Decode CXL Error Log new 196dff2712ca efi: random: combine bootloader provided RNG seed with RNG [...] new 63ffb573df66 efi: vars: prohibit reading random seed variables new a89474aaf7cf efi: stub: use random seed from EFI variable new e346bebbd36b efi: libstub: Always enable initrd command line loader and [...] new 29636a5ce87b efi: Put Linux specific magic number in the DOS header new d9f26ae73125 Merge tag 'v6.1-rc8' into efi/next new a37dac5c5dcf arm64: efi: Limit allocations to 48-bit addressable physic [...] new ff7a167961d1 arm64: efi: Execute runtime services from a dedicated stack new e8dfdf3162eb arm64: efi: Recover from synchronous exceptions occurring [...] new fc4c9f450493 Merge tag 'efi-next-for-v6.2' of git://git.kernel.org/pub/ [...]
The 73 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/security/keys/trusted-encrypted.rst | 3 +- MAINTAINERS | 1 - arch/arm/include/asm/efi.h | 3 - arch/arm/kernel/efi.c | 31 +- arch/arm64/include/asm/efi.h | 27 +- arch/arm64/kernel/Makefile | 9 +- arch/arm64/kernel/efi-entry.S | 69 --- arch/arm64/kernel/efi-rt-wrapper.S | 39 +- arch/arm64/kernel/efi.c | 49 +++ arch/arm64/kernel/image-vars.h | 8 - arch/arm64/mm/fault.c | 4 + arch/loongarch/include/asm/efi.h | 14 +- arch/loongarch/kernel/efi.c | 24 +- arch/loongarch/kernel/head.S | 3 +- arch/loongarch/kernel/image-vars.h | 8 - arch/riscv/include/asm/efi.h | 13 +- arch/riscv/kernel/image-vars.h | 6 - arch/x86/Kconfig | 31 ++ arch/x86/boot/compressed/efi_thunk_64.S | 6 - arch/x86/boot/header.S | 3 +- arch/x86/include/asm/efi.h | 109 +++-- arch/x86/kernel/setup.c | 1 + arch/x86/platform/efi/Makefile | 5 +- arch/x86/platform/efi/efi.c | 8 +- .../firmware => arch/x86/platform}/efi/fake_mem.c | 79 +++- .../firmware => arch/x86/platform}/efi/memmap.c | 146 +------ .../x86/platform}/efi/runtime-map.c | 7 +- drivers/firmware/efi/Kconfig | 45 -- drivers/firmware/efi/Makefile | 7 +- drivers/firmware/efi/cper.c | 9 + drivers/firmware/efi/cper_cxl.c | 179 ++++++++ drivers/firmware/efi/cper_cxl.h | 66 +++ drivers/firmware/efi/efi-init.c | 21 +- drivers/firmware/efi/efi-pstore.c | 23 +- drivers/firmware/efi/efi.c | 14 +- drivers/firmware/efi/fake_mem.h | 10 - drivers/firmware/efi/fdtparams.c | 4 + drivers/firmware/efi/libstub/Makefile | 34 +- drivers/firmware/efi/libstub/Makefile.zboot | 22 +- drivers/firmware/efi/libstub/alignedmem.c | 7 +- drivers/firmware/efi/libstub/arm32-stub.c | 37 -- drivers/firmware/efi/libstub/arm64-entry.S | 67 +++ drivers/firmware/efi/libstub/arm64-stub.c | 75 +--- drivers/firmware/efi/libstub/arm64.c | 76 ++++ drivers/firmware/efi/libstub/efi-stub-entry.c | 65 +++ drivers/firmware/efi/libstub/efi-stub-helper.c | 150 +------ drivers/firmware/efi/libstub/efi-stub.c | 140 ++---- drivers/firmware/efi/libstub/efistub.h | 143 ++++-- drivers/firmware/efi/libstub/file.c | 122 ++++-- drivers/firmware/efi/libstub/intrinsics.c | 18 + drivers/firmware/efi/libstub/loongarch-stub.c | 89 +--- .../efi/libstub/{loongarch-stub.c => loongarch.c} | 34 +- drivers/firmware/efi/libstub/mem.c | 5 +- drivers/firmware/efi/libstub/printk.c | 154 +++++++ drivers/firmware/efi/libstub/random.c | 96 +++- drivers/firmware/efi/libstub/randomalloc.c | 7 +- drivers/firmware/efi/libstub/riscv-stub.c | 96 +--- .../firmware/efi/libstub/{riscv-stub.c => riscv.c} | 59 +-- drivers/firmware/efi/libstub/screen_info.c | 56 +++ drivers/firmware/efi/libstub/string.c | 95 +++- drivers/firmware/efi/libstub/zboot-header.S | 5 +- drivers/firmware/efi/libstub/zboot.c | 307 ++++--------- drivers/firmware/efi/memmap.c | 243 +---------- drivers/firmware/efi/runtime-wrappers.c | 1 + drivers/firmware/efi/x86_fake_mem.c | 75 ---- fs/efivarfs/inode.c | 4 + fs/efivarfs/super.c | 3 + include/linux/cxl_err.h | 22 + include/linux/efi.h | 55 +-- include/linux/kallsyms.h | 9 + include/linux/module.h | 1 - include/linux/pe.h | 9 +- include/linux/sched/sysctl.h | 6 - init/Kconfig | 13 + kernel/Makefile | 1 + kernel/kallsyms.c | 116 ++++- kernel/kallsyms_internal.h | 1 + kernel/kallsyms_selftest.c | 485 +++++++++++++++++++++ kernel/kallsyms_selftest.h | 13 + kernel/livepatch/core.c | 31 +- kernel/module/Kconfig | 3 +- kernel/module/decompress.c | 100 ++++- kernel/module/main.c | 3 - kernel/module/sysfs.c | 2 +- kernel/params.c | 23 +- kernel/sched/core.c | 13 +- kernel/sched/fair.c | 18 +- kernel/sysctl.c | 19 - scripts/kallsyms.c | 78 +++- scripts/link-vmlinux.sh | 4 + security/integrity/digsig.c | 6 +- security/integrity/ima/Kconfig | 2 +- security/integrity/ima/ima_main.c | 7 +- security/integrity/ima/ima_policy.c | 51 ++- security/integrity/ima/ima_template.c | 9 +- security/integrity/platform_certs/load_uefi.c | 1 + security/keys/encrypted-keys/encrypted.c | 6 +- 97 files changed, 2667 insertions(+), 1809 deletions(-) delete mode 100644 arch/arm64/kernel/efi-entry.S rename {drivers/firmware => arch/x86/platform}/efi/fake_mem.c (58%) copy {drivers/firmware => arch/x86/platform}/efi/memmap.c (61%) rename {drivers/firmware => arch/x86/platform}/efi/runtime-map.c (96%) create mode 100644 drivers/firmware/efi/cper_cxl.c create mode 100644 drivers/firmware/efi/cper_cxl.h delete mode 100644 drivers/firmware/efi/fake_mem.h create mode 100644 drivers/firmware/efi/libstub/arm64-entry.S create mode 100644 drivers/firmware/efi/libstub/arm64.c create mode 100644 drivers/firmware/efi/libstub/efi-stub-entry.c copy drivers/firmware/efi/libstub/{loongarch-stub.c => loongarch.c} (72%) create mode 100644 drivers/firmware/efi/libstub/printk.c copy drivers/firmware/efi/libstub/{riscv-stub.c => riscv.c} (56%) create mode 100644 drivers/firmware/efi/libstub/screen_info.c delete mode 100644 drivers/firmware/efi/x86_fake_mem.c create mode 100644 include/linux/cxl_err.h create mode 100644 kernel/kallsyms_selftest.c create mode 100644 kernel/kallsyms_selftest.h